Results 81 to 90 of about 35,561 (292)

Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions [PDF]

open access: yes, 2011
In this paper, we analyze the collision resistance of SHA-2 and provide the first results since the beginning of the NIST SHA-3 competition. We extend the previously best known semi-free-start collisions on SHA-256 from 24 to 32 (out of 64) steps and show a collision attack for 27 steps.
Florian Mendel   +2 more
openaire   +1 more source

Criticality Aware Soft Error Mitigation in the Configuration Memory of SRAM based FPGA

open access: yes, 2018
Efficient low complexity error correcting code(ECC) is considered as an effective technique for mitigation of multi-bit upset (MBU) in the configuration memory(CM)of static random access memory (SRAM) based Field Programmable Gate Array (FPGA) devices ...
Chakrabarti, Amlan   +4 more
core   +1 more source

Protocol‐Agnostic Meta Key Distribution for Encrypted Wireless Communications Enabled by Space‐Time‐Coding Metasurface

open access: yesAdvanced Science, EarlyView.
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li   +7 more
wiley   +1 more source

Synthesis of Second-Generation Analogs of Temporin-SHa Peptide Having Broad-Spectrum Antibacterial and Anticancer Effects

open access: yesAntibiotics
Antimicrobial peptides (AMPs) are a promising class of therapeutic alternatives with broad-spectrum activity against resistant pathogens. Small AMPs like temporin-SHa (1) and its first-generation analog [G10a]-SHa (2) possess notable efficacy against ...
Arif Iftikhar Khan   +8 more
doaj   +1 more source

XPC Deficiency Activate Cisplatin‐Mediated Autophagy in Bladder Cancer by Limiting Novel PHRF1‐Mediated Ubiquitination of the p53 Protein

open access: yesAdvanced Science, EarlyView.
This study reveals that XPC regulates autophagy signaling beyond its noncanonical DNA repair role, uncovering the XPC‐p‐ATM‐KDM4A‐PHRF1 axis as a novel mechanism for autophagy modulation under DNA damage stress. It identifies PHRF1 as a novel p53 ubiquitin ligase.
Baixiong Zhao   +10 more
wiley   +1 more source

Exposure to second-hand aerosol produced by electronic cigarettes: a systematic review

open access: yesTobacco Induced Diseases, 2018
Background Since 2007, the use of electronic cigarettes has grown rapidly around the world. This trend raises concerns about the potential exposure of bystanders to aerosols from electronic cigarettes, particularly considering that its use in public ...
Esteve Fernández   +4 more
doaj   +1 more source

Verified Correctness and Security of mbedTLS HMAC-DRBG

open access: yes, 2017
We have formalized the functional specification of HMAC-DRBG (NIST 800-90A), and we have proved its cryptographic security--that its output is pseudorandom--using a hybrid game-based proof.
Almeida José Bacelar   +8 more
core   +1 more source

Heterophase Engineering Creates a Built‐in Highway to Achieve Local High‐Concentration Phosphorus Doping for Robust K‐Ion Storage

open access: yesAdvanced Science, EarlyView.
A local high‐concentration doping enabled by heterophase engineering is proposed for the first time, achieving a remarkable P doping level of 34 at.% and thereby maximizing the advantages of doping for enhancing the K⁺ storage performance of transition metal chalcogenides (TMCs).
Dawei Sha   +4 more
wiley   +1 more source

Use of electronic cigarettes and secondhand exposure to their aerosols are associated with asthma symptoms among adolescents: a cross-sectional study

open access: yesRespiratory Research, 2020
Background Globally, a surge in electronic cigarette (e-cigarette) use has been observed in recent years, with youth being the most susceptible group.
Abdullah Alnajem   +8 more
doaj   +1 more source

Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family [PDF]

open access: yes, 2012
We present a new concept of biclique as a tool for preimage attacks, which employs many powerful techniques from differential cryptanalysis of block ciphers and hash functions. The new tool has proved to be widely applicable by inspiring many authors to publish new results of the full versions of AES, KASUMI, IDEA, and Square. In this paper, we show
Dmitry Khovratovich   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy